Chelsea Holland Komlo
  • Home
  • Tag
  • Author

A note on proving security of Schnorr

May 4, 2022 1 min read
Schnorr signatures and identification protocols have undergone significant security analysis over the years. However, strategies for proving their security differ depending on slight variations in the schemes and security models. I wrote a
Read Now Read Later
Chelsea H. Komlo
By: Chelsea H. Komlo

Attacks and Fixes on DKGs

Nov 29, 2021 1 min read
I recently gave my first in-person lecture in almost two years since the pandemic began, and it was such a great experience. I talked about attacks and fixes for distributed key generation (DKG)
Read Now Read Later
Chelsea H. Komlo
By: Chelsea H. Komlo

FROST at the NIST Workshop on Threshold Schemes

Nov 25, 2020 1 min read
I was invited to present FROST and to give recommendations for the standardization of Schnorr threshold signatures at the recent NIST workshop on standardization of threshold schemes [https://csrc.nist.gov/Events/2020/
Read Now Read Later
Chelsea H. Komlo
By: Chelsea H. Komlo

New publication on security of applied secret sharing schemes

Dec 20, 2019 1 min read
I am excited to say that the camera ready version of our publication "Mind the Gap: Ceremonies for Applied Secret Sharing" in the Privacy Enhancing Symposium 2020 is out! You can
Read Now Read Later
Chelsea H. Komlo
By: Chelsea H. Komlo

A Gentle Introduction to Lattices and Lattice-based Key Exchanges: Part 2

Jul 12, 2019 11 min read cryptographylattices
Important Terms and Notation For the purposes of this post, it is important to understand a few basic notation and terms. We define further linear algebra terms inPart 1 [https://writing.chelseakomlo.com/
Read Now Read Later
Chelsea H. Komlo
By: Chelsea H. Komlo
Newer Posts
Page 2 of 3
Older Posts
Powered by Ghost
Chelsea Holland Komlo